Chapter 8 Solution

Discovering Computer 2011 – Living in a Digital World
Page 435-436
Lecturer : Tri Djoko Wahjono


  1. All sizes of computers typically use the same operating system because operating systems generally are written to run on any type of computer. (False)
  2. Booting is the process of permanently removing a computer from operation. (False)
  3. Permissions define who can access certain resources and when they can access those resources. (True)
  4. A device-independent program is one that runs only on a specific type or make of computer. (False)
  5. Users can control and customize a variety of gadgets on the Windows desktop. (True)
  6. Linux is open source software, which means its code can be modified and redistributed. (True)
  7. BlackBerry devices provide PIM capabilities such as managing schedules, contacts, and appointments, as well as phone capabilities. (True)
  8. Windows allows you to manage your documents, pictures, music, and other files using Windows Explorer. (True)
  9. An adware remover is a program that detects and deletes spam. (False)
  10. Phishing is a scam in which a perpetrator attempts to obtain your personal and/or financial information. (True)

Multiple Choice

  1. B. CMOS
  2. B. Windows ReadyBoost
  3. C. Gadget
  4. A. Index
  5. C. Contiguous sectors, which speeds
  6. D. Windows Firewall
  7. C. Adware
  8. A. Phishing filter


  1. Sleep mode, e. works with the mouse to flip through windows by rolling the wheel on the mouse
  2. Hibernate, j. an icon on the desktop or in a folder that provides a user with immediate access to a program or file
  3. Page, h. multitasking operating system developed in the early 1970s by scientists at Bell Laboratories
  4. User name, d. unique combination of characters that identifies one specific user
  5. Aero Flip 3D, f. saves any open documents and programs to RAM, turns off all unneeded functions, and then places the computer in a low-power state
  6. UNIX, a. the practice of sharing or pooling computing resources, such as servers
  7. Virtualization, g. with virtual memory, the amount of data and program instructions that can be swapped at a given time
  8. NetWare, b. server operating system designed for client/server networks
  9. Google Andriod, c. saves any open documents and programs to a hard disk before removing power from the computer
  10. Shortcut, i. operating system for mobile devices

Short Answer

  1. How is a cold boot different from a warm boot?
    Cold boot is the process of starting up a computer when previously the computer is turned off completely. A warm boot, by contrast, is the process of using the operating system to restart a computer.
    – How is a memory-resident part of an operating system different from a nonresident part of an operating system?
    Memory resident, which means instructions remains in memory while the computer is running. While nonresident, means instructions remain on a storage medium until they are needed.
  2. – What is a user interface?
    User interface controls how you enter data and instructions and how information is displayed on the screen.
    – How are graphical and command-line user interfaces different?
    Command line interface is completely command controlled ,flow of program controls by giving commands. so user have to familiar with commands. a novice user can not operate a CUI environment. In Graphical user interface user interact to a visual environment like buttons, icons, images. so it is easy to use and a novice user can operate it without pre-training.
  3. What is the purpose of an automatic update feature?
    The purpose of an automatic update feature are to fix program bugs, or errors, enhancements to security, modifications to device drivers, access to new or expanded components such as desktop themes or games, and even updates to application software on the computer such as a Web browser or an e-mail program.
    – Why and when might a user receive a service pack?
    It’s because to increase the security and functionality of the software updated by the service pack. And user will receive a service update whenever they become available through an official service run by the company that made the software the service pack is for.
  4. – What happens during a backup?
    The computer is storing all of your current files onto any disk drive or memory space you select. It copies your in tire file database, including games, music, pictures, and videos into some safely secured area where you can easily restore your documents and computer state from.
    – What is the purpose of a restore utility?
    The purpose of a restore utility is to reverse the backup process and return backed up files to their original form.
  5. Describe four embedded operating systems.
    Windows Embedded CE is a scaled-down Windows operating system designed for use on communications, entertainment, and computing devices with limited functionality.functionality. Windows Mobile, an operating system based on Windows Embedded CE, includes functionality, programs, and a user interface designed for specific types of smart phones and PDAs. iPhone OS, developed by Apple, is an operating system for the iPhone and iPod touch, Apple’s smart phone and touch screen portable media player, respectively. Google Android is an operating system designed by Google for mobile devices.
    What are the uses for each of the four types?
    The uses of Windows Embedded CE include VoIP telephones, industrial control devices, digital cameras, point-of-sale terminals, automated teller machines, digital photo frames, fuel pumps, security robots, handheld navigation devices, portable media players, ticket machines, and computerized sewing machines. While Windows mobile, iPhone OS and Google android are used for multitasking such as messaging, internet, chatting, calculating number, calender, etc.


This entry was posted in PTI. Bookmark the permalink.

One Response to Chapter 8 Solution

  1. chapter8 matching answers are Wrong!!!!!!! Should be 1-f 2-c 3-g 4-d 5-e 6-h 7-a 8-b 9-i 10-j…glad to be of help !

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s